DOS and DDOS Basic

 



Today you will learn about basics of DOS and DDOS

 

What is DOS & DDOS?

 

DOS ⇒ Denial Of Service

 

a denial of service could in the form of:

  • Hijacking web-servers
  • Overloading ports with requests rendering them unusable
  • Denying wireless authentication
  • Denying any sort of service that is provided on the internet

NOTE :

 

Attacks of such intent can be performed from a single machine

 

While single machine attacks are much easier to execute and monitor, they are also easy to detect and mitigate too.

 

To solve this issue, the attack could be executed from multiple devices spread across a wide area. ⇒ Such attacks are called Distributed Denial of Service or DDOS attacks.

How Does it Work?

 

Goal of DOS Attack ⇒ making a certain service unavailable.

 

Since everything that is attacked is, in reality, running on a machine, the service can be made unavailable if the performance on the machine can be brought down.

 

This is the fundamental behind DOS and DDOS.

 

  • Some DOS attacks are executed by flooding servers with connection requests until the server is overloaded and is deemed useless.
  • Others are executed by sending unfragmented packets to a server which they are unable to handle
  • These methods when executed by a botnet, exponentially increase the amount of damage that they are doing, and their difficulty to mitigate increases in leaps and bounds.

 

Types of DDOS Attacks

 

Ping of Death ⇒

  • In this the attacker sends packets that are more than the max packet size when the packet fragments are added up.
  • max packet size is ⇒ 65,535 bytes
  • But in this attack, attacker sends more than 65,535 bytes
  • Computers generally do not know what to do with such packets and end up freezing or sometimes completely crashing.

Reflected Attacks ⇒

  • This type of attack is performed with the help of a botnet also called reflectors in this case
  • The attacker sends a host of innocent computers a connection request using a botnet, that looks like it came from the victim machine (this is done by spoofing the source in the packet header).
  • This makes the host of computer send an acknowledgment to the victim computer.
  • Since there are multiple such requests from different computers to the same machine, this overloads the computer and crashes it.
  • This type is also called a smurf attack.

Mailbomb ⇒

  • Mailbomb attacks generally attack email servers.
  • In this type of attacks instead of packets, oversized emails filled with random garbage values are sent to a targeted email server
  • This generally crashes the email server due to a sudden spike in load and renders them useless until fixed.

Teardrop ⇒

  • In this type of attack, the fragmentation offset field of a packet is abused.
  • One of the fields in an IP header is the “fragment offset” field, indicating the starting position, or offset, of the data contained in a fragmented packet relative to the data in the original packet.
  • If the sum of the offset and size of one fragmented packet differs from that of the next fragmented packet, the packets overlap
  • When this happens, a server vulnerable to teardrop attacks is unable to reassemble the packets — resulting in a denial-of-service condition.

Smurf ⇒

  • This type of attack uses large amounts of Internet Control Message Protocol (ICMP) ping traffic target at an Internet Broadcast Address.
  • The reply IP address is spoofed to that of the intended victim.
  • All the replies are sent to the victim instead of the IP used for the pings.
  • Since a single Internet Broadcast Address can support a maximum of 255 hosts, a smurf attack amplifies a single ping 255 times.
  • The effect of this is slowing down the network to a point where it is impossible to use it.

 

SYN attack ⇒

  • SYN is a short form for Synchronize
  • This type of attack takes advantage of the three-way handshake to establish communication using TCP.
  • SYN attack works by flooding the victim with incomplete SYN messages.
  • This causes the victim machine to allocate memory resources that are never used and deny access to legitimate users.

Buffer overflow ⇒

  • A buffer is a temporal storage location in RAM that is used to hold data so that the CPU can manipulate it before writing it back to the disc
  • Buffers have a size limit.
  • This type of attack loads the buffer with more data that it can hold.
  • This causes the buffer to overflow and corrupt the data it holds.
  • An example of a buffer overflow is sending emails with file names that have 256 characters.

Post a Comment

Previous Post Next Post